Vulnerability Disclosure Policy

Last updated: 2025-01-01

1. Introduction

At iyzitrace, we take security seriously. We welcome responsible disclosure of security vulnerabilities that could impact our platform, infrastructure or customers.

2. Scope

In-scope assets include:

  • iyzitrace web application and dashboards.
  • APIs and authentication flows.
  • Publicly exposed services operated by iyzitrace.

Out-of-scope includes:

  • Social engineering attacks.
  • Physical security or office locations.
  • Third-party services not under our direct control.

3. Responsible Research Guidelines

Please follow these guidelines:

  • Do not exploit a vulnerability beyond what is necessary to prove its existence.
  • Do not access, modify or delete customer data.
  • Do not impact service availability or user experience.
  • Allow us reasonable time to investigate and remediate before public disclosure.

4. Reporting

Please send your findings to [email protected] with:

  • Detailed description of the vulnerability.
  • Steps to reproduce (PoC code or screenshots).
  • Potential impact and affected components.
  • Your contact details for follow-up.

5. Safe Harbor

If you comply with this policy while investigating and reporting a vulnerability, we will not pursue legal action against you for your research activities.

6. Recognition and Rewards

We currently do not operate a public bug bounty program. However, we may offer thanks, recognition or other forms of appreciation for high-impact, clearly documented reports.

7. Contact

For any security-related questions, please reach out to [email protected].